Kaspersky ID:
KLA12220
Дата обнаружения:
13/07/2021
Обновлено:
31/03/2025

Описание

Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, bypass security restrictions, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Microsoft Word can be exploited remotely to execute arbitrary code.
  2. A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely to execute arbitrary code.
  3. A spoofing vulnerability in Microsoft Office Online Server can be exploited remotely to spoof user interface.
  4. A security feature bypass vulnerability in Microsoft Office can be exploited remotely to bypass security restrictions.
  5. A spoofing vulnerability in Microsoft SharePoint Server can be exploited remotely to spoof user interface.
  6. An information disclosure vulnerability in Microsoft SharePoint Server can be exploited remotely to obtain sensitive information.
  7. A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.

Первичный источник обнаружения

Эксплуатация

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Связанные продукты

Список CVE

  • CVE-2021-34452
    critical
  • CVE-2021-34520
    critical
  • CVE-2021-34451
    high
  • CVE-2021-34467
    critical
  • CVE-2021-34469
    critical
  • CVE-2021-34517
    high
  • CVE-2021-34468
    critical
  • CVE-2021-34519
    high
  • CVE-2021-34518
    critical
  • CVE-2021-34501
    critical

Список KB

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.